hack and bug bounty
@hack_com
21
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
21 subscribers
hack and bug bounty
Rebranding Roulette: Musk’s Billion-Dollar Gamble on X Corp
Medium
Rebranding Roulette: Musk’s Billion-Dollar Gamble on X Corp
What happens when a visionary like Elon Musk decides to embark on a brand transformation worth a staggering $44 billion? Brace yourselves…
hack and bug bounty
Tech Titans Showdown: Zuckerberg vs. Musk — The Future of Billionaire Brawls
Medium
Tech Titans Showdown: Zuckerberg vs. Musk — The Future of Billionaire Brawls
Prepare to be captivated by a jaw-dropping twist that defies expectations: a colossal clash is on the horizon, featuring none other than…
hack and bug bounty
Mastering Burp Suite: Advanced Techniques and Tips
Medium
Mastering Burp Suite: Advanced Techniques and Tips
Burp Suite is an indispensable tool for web application security testing and is widely used by penetration testers and ethical hackers…
hack and bug bounty
Gone in a Click: IDOR Vulnerabilities in Image Upload Function
Medium
Gone in a Click: IDOR Vulnerabilities in Image Upload Function
Greetings, fellow cybersecurity researchers! I’m Rootxyash, a passionate security researcher and an unwavering part-time bug bounty hunter…
hack and bug bounty
InfoSecSherpa’s News Roundup for Friday, August 11, 2023
Medium
InfoSecSherpa’s News Roundup for Friday, August 11, 2023
InfoSecSherpa: Your Guide Up a Mountain of Information!
hack and bug bounty
THM — Intermediate Nmap | 48/100
Medium
THM — Intermediate Nmap | 48/100
Hey! Here is a quick writeup of the very basic TryHackMe challenge Intermediate Nmap. This was an extremely quick challenge and would be…
hack and bug bounty
Twitter’s Evolution under ‘
✖️
’ Rebranding: Assessing the Impact of Elon Musk’s Leadership
Medium
Twitter’s Evolution under ‘
✖️
’ Rebranding: Assessing the Impact of Elon Musk’s Leadership
Interestingly, Musk is preoccupied with the letter X. In 1999, Musk co-founded X.com, which later became Paypal. The letter was found in…
hack and bug bounty
Radical Redirection Rodeo: Exploring The Redirection Bug Classes Of Server Side Open Redirects and…
Medium
Radical Redirection Rodeo: Exploring The Redirection Bug Classes Of Server Side Open Redirects and…
Radical Redirection Rodeo: Exploring The Redirection Bug Classes Of Server Side Open Redirects and Client Side Open Redirects More Indepth So I wanted to explore the two bug classes of server side…
hack and bug bounty
Heart of Stone’: See Trailer and More For Gal Gadot Action Movie — Netflix Tudum.
Medium
Heart of Stone’: See Trailer and More For Gal Gadot Action Movie — Netflix Tudum.
The film stars Gal Gadot, Jamie Dornan, Alia Bhatt, Sophie Okonedo, and Matthias Schweighöfer. Heart of Stone.
hack and bug bounty
From Boredom to Bounty: The Story of a Surprise XSS (Get Reward 500$)
Medium
From Boredom to Bounty: The Story of a Surprise XSS (Get Reward 500$)
Buckle up, dear readers, for a tale that defies the mundane and embraces the hilariously unexpected! It all started with an online…
hack and bug bounty
How I Supercharge Learning Cybersecurity with Cisco Packet Tracer
Medium
How I Supercharge Learning Cybersecurity with Cisco Packet Tracer
“Whatever, I’m getting cheese fries.” (Regina George, Mean Girls)
hack and bug bounty
Advanced Linux Commands for the Modern Hacker
Medium
Advanced Linux Commands for the Modern Hacker
Linux, the backbone of most modern servers and a favorite amongst the hacker community, offers a robust collection of commands that grant…
hack and bug bounty
從 2013 到 2023: Web Security 十年之進化與趨勢!
Orange Tsai
從 2013 到 2023: Web Security 十年之進化與趨勢!
TL;DR for Hackers & Researchers: this is a more conceptual talk for web developers. All are in Mandarin but you can check the slides here if interested. 好久沒有打部落格了,紀錄一下這次我在 WebConf 2023 上的演講,大概就是把
hack and bug bounty
Should you launch a BugBounty program? as a company
Medium
Should you launch a BugBounty program? as a company
Organizing a Bug Bounty Program: Pros and Cons
hack and bug bounty
Race Condition Vulnerability: Understanding and Exploiting It— 3 | 2023
Medium
Race Condition Vulnerability: Understanding and Exploiting It— 3 | 2023
What is Race Condition Vulnerability and How to Exploit it? — Navigating the Intricacies of Race Condition Vulnerabilities | Karthikeyan…
hack and bug bounty
Top Ethical Hacking Courses Online for Singaporean Enthusiasts
Medium
Top Ethical Hacking Courses Online for Singaporean Enthusiasts
Ethical hacking, or white-hat hacking, involves deploying the same tools, techniques, and processes as hackers do but with the intention of…
hack and bug bounty
Enhancing Home Network Security with Firewalla
Medium
Enhancing Home Network Security with Firewalla
“Enhancing Home Network Security with Firewalla” is published by SimeonOnSecurity.
hack and bug bounty
Choosing Between pfSense and Firewalla for Enhanced Network Security
Medium
Choosing Between pfSense and Firewalla for Enhanced Network Security
Firewalls are essential components of any network, acting as barriers between your internal network and potential threats from the internet. pfSense and Firewalla are both firewall solutions that…
hack and bug bounty
Cyber Security releted help:
Medium
Cyber Security releted help:
for wordpress malware removal: https://www.fiverr.com/s/51Qgvb
hack and bug bounty
XSStrike — A tool to detect XSS
Medium
XSStrike — A tool to detect XSS
Introduction: